Do multiple infections lead to better security?A new study on CHES 2014 infective countermeasure

来源 :中国科学:信息科学(英文版) | 被引量 : 0次 | 上传用户:onlymeley
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Dear editor,rnImplementation attacks such as fault attack(FA)[1]and side-channel analysis (SCA)[2]are signifi-cant threats to the cryptographic device security.Infective countermeasure is a promising strategy to resist FAs.Its principle is to scramble the data path of the encryption and make the faulty ciphertext useless in the key retrieval.The scrambling here is called infection.It can be executed either once at the end of the algorithm or multiple times between different encryption operations.
其他文献
This paper considers the global stability problem of the system comprising a pipe conveying fluid and a nonlinear energy sink (PCF-NES) system.First,a quadratic form model containing a gradient term of a convex function is obtained from a high-order parti
InGaN/GaN multiple quantum-well(MQW)structures with a wavelength range of green were successfully grown on a c-plane GaN template with SiO2 stripe patterns along the[11-20]and[1-100]directions as a mask.The surface morphologies of both samples were invest
Autism spectrum disorder (ASD),a developmental disorder severely affecting cognition and social behavior,is increasing in prevalence [1].This increasing trend is especially severe in children,making the early intervention crucial to ASD treatment.Children
期刊
This paper mainly discusses the stabilization problem for discrete-time Markov jump linear systems (MJLSs) involving multiplicative noise with an infinite horizon.The cost weighting matrices are generalized to be indefinite.To the best of our knowledge,th
Focal distance tabu search modifies a standard tabu search algorithm for binary optimization by augmenting a periodic diversification step that drives the search away from a current best (or elite) solution until the objective function deteriorates beyond
In the present study,the finite-time asynchronous dissipative filter design problem for the Markov jump systems with conic-type nonlinearity is studied.The hidden Markov model can describe the asyn-chronism embodied in the system modes and the filter mode
Dear editor,rnThe propulsion module of an anchor-hole driller controls the drilling speed with a hydraulic cylinder that provides the ax-ial force when driving a drilling rig to break the surrounding rocks.This drilling process is traditionally controlled
期刊
Individual privacy preservation has become an important issue with the development of big data technology.The definition of p-differential identifiability (DI) precisely matches the legal definitions of privacy,which can provide an easy parameterization a
Tangential leakage loss reduction has great significance on improving the performance of scroll compressors.In this study,the flow field of a scroll compressor working with CO2 was numerically investigated.The development characteristics of the tangential
In order to protect the privacy and data security of mobile devices during the transactions in the industrial Internet of Things (IIoT),we propose a mobile edge computing (MEC)-based mobile blockchain framework by considering the limited bandwidth and com